Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (121)
  • Open Access

    ARTICLE

    An Ontology Based Multilayer Perceptron for Object Detection

    P. D. Sheena Smart1,*, K. K. Thanammal2, S. S. Sujatha2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2065-2080, 2023, DOI:10.32604/csse.2023.028053

    Abstract In object detection, spatial knowledge assisted systems are effective. Object detection is a main and challenging issue to analyze object-related information. Several existing object detection techniques were developed to consider the object detection problem as a classification problem to perform feature selection and classification. But these techniques still face, less computational efficiency and high time consumption. This paper resolves the above limitations using the Fuzzy Tversky index Ontology-based Multi-Layer Perception method which improves the accuracy of object detection with minimum time. The proposed method uses a multilayer for finding the similarity score. A fuzzy membership function is used to validate… More >

  • Open Access

    ARTICLE

    A Study on the Importance of Core Strength and Coordination Balance during Basketball Based on Biomechanics

    Yixin Liu*

    Molecular & Cellular Biomechanics, Vol.19, No.3, pp. 131-139, 2022, DOI:10.32604/mcb.2022.019342

    Abstract When basketball players play against each other in a game, better coordinated balance can give them a better advantage. This paper briefly introduces the coordination balance and core strength of basketball players. Twenty basketball varsity members were selected from Chengdu College of University of Electronic Science and Technology of China as subjects for the test. The athletes were randomly divided into a control group and an experimental group. The control group received regular strength training, and the experimental group received core strength training in addition to regular training. Both groups underwent isometric muscle strength test, coordination and balance test and… More >

  • Open Access

    ARTICLE

    No-Reference Blur Assessment Based on Re-Blurring Using Markov Basis

    Gurwinder Kaur*, Ashwani Kumar

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 281-296, 2023, DOI:10.32604/iasc.2023.026393

    Abstract Blur is produced in a digital image due to low pass filtering, moving objects or defocus of the camera lens during capture. Image viewers are annoyed by blur artefact and the image's perceived quality suffers as a result. The high-quality input is relevant to communication service providers and imaging product makers because it may help them improve their processes. Human-based blur assessment is time-consuming, expensive and must adhere to subjective evaluation standards. This paper presents a revolutionary no-reference blur assessment algorithm based on re-blurring blurred images using a special mask developed with a Markov basis and Laplace filter. The final… More >

  • Open Access

    ARTICLE

    Intelligent Vehicular Communication Using Vulnerability Scoring Based Routing Protocol

    M. Ramya Devi*, I. Jasmine Selvakumari Jeya

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 31-45, 2023, DOI:10.32604/iasc.2023.026152

    Abstract Internet of Vehicles (IoV) is an intelligent vehicular technology that allows vehicles to communicate with each other via internet. Communications and the Internet of Things (IoT) enable cutting-edge technologies including such self-driving cars. In the existing systems, there is a maximum communication delay while transmitting the messages. The proposed system uses hybrid Co-operative, Vehicular Communication Management Framework called CAMINO (CA). Further it uses, energy efficient fast message routing protocol with Common Vulnerability Scoring System (CVSS) methodology for improving the communication delay, throughput. It improves security while transmitting the messages through networks. In this research, we present a unique intelligent vehicular… More >

  • Open Access

    ARTICLE

    Seed-Oriented Local Community Detection Based on Influence Spreading

    Shenglong Wang1,*, Jing Yang1,*, Xiaoyu Ding2, Jianpei Zhang1, Meng Zhao1

    CMES-Computer Modeling in Engineering & Sciences, Vol.132, No.1, pp. 215-249, 2022, DOI:10.32604/cmes.2022.018050

    Abstract In recent years, local community detection algorithms have developed rapidly because of their nearly linear computing time and the convenience of obtaining the local information of real-world networks. However, there are still some issues that need to be further studied. First, there is no local community detection algorithm dedicated to detecting a seed-oriented local community, that is, the local community with the seed as the core. The second and third issues are that the quality of local communities detected by the previous local community detection algorithms are largely dependent on the position of the seed and predefined parameters, respectively. To… More >

  • Open Access

    ARTICLE

    Hybridization of Metaheuristics Based Energy Efficient Scheduling Algorithm for Multi-Core Systems

    J. Jean Justus1, U. Sakthi2, K. Priyadarshini3, B. Thiyaneswaran4, Masoud Alajmi5, Marwa Obayya6, Manar Ahmed Hamza7,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 205-219, 2023, DOI:10.32604/csse.2023.025256

    Abstract The developments of multi-core systems (MCS) have considerably improved the existing technologies in the field of computer architecture. The MCS comprises several processors that are heterogeneous for resource capacities, working environments, topologies, and so on. The existing multi-core technology unlocks additional research opportunities for energy minimization by the use of effective task scheduling. At the same time, the task scheduling process is yet to be explored in the multi-core systems. This paper presents a new hybrid genetic algorithm (GA) with a krill herd (KH) based energy-efficient scheduling technique for multi-core systems (GAKH-SMCS). The goal of the GAKH-SMCS technique is to… More >

  • Open Access

    ARTICLE

    The Fabrication of Water-Soluble Chitosan Capsule Shell Modified by Alginate and Gembili Starch (Dioscorea esculenta L)

    Yatim Lailun Ni’mah*, Suprapto Suprapto, Harmami, Ita Ulfin, Puput Asmaul Fauziyah

    Journal of Renewable Materials, Vol.10, No.9, pp. 2365-2376, 2022, DOI:10.32604/jrm.2022.020001

    Abstract Capsule shells have been successfully fabricated from water-soluble chitosan (WSC) with the addition of alginate and Gembili starch. WSC was synthesized from crab shell chitosan by depolymerization reaction. The capsule shells were made with the composition of WSC: Alginate, 2:1, 3:1 and 4:1 (w/w) with and without the addition of Gembili starch. Gembili starch was added with a ratio of Alginate: Starch, 1:1 (w/w). The capsule shell properties were evaluated according to Indonesian Pharmacopoeia standard. The solubility test showed that the capsule shells were comply with the standard. The highest degrees of swelling in water and HCl 0.1 N solution… More > Graphic Abstract

    The Fabrication of Water-Soluble Chitosan Capsule Shell Modified by Alginate and Gembili Starch (<i>Dioscorea esculenta</i> L)

  • Open Access

    ARTICLE

    Detecting IoT Botnet in 5G Core Network Using Machine Learning

    Ye-Eun Kim1, Min-Gyu Kim2, Hwankuk Kim2,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4467-4488, 2022, DOI:10.32604/cmc.2022.026581

    Abstract As Internet of Things (IoT) devices with security issues are connected to 5G mobile networks, the importance of IoT Botnet detection research in mobile network environments is increasing. However, the existing research focused on AI-based IoT Botnet detection research in wired network environments. In addition, the existing research related to IoT Botnet detection in ML-based mobile network environments have been conducted up to 4G. Therefore, this paper conducts a study on ML-based IoT Botnet traffic detection in the 5G core network. The binary and multiclass classification was performed to compare simple normal/malicious detection and normal/three-type IoT Botnet malware detection. In… More >

  • Open Access

    ARTICLE

    Mean Opinion Score Estimation for Mobile Broadband Networks Using Bayesian Networks

    Ayman A. El-Saleh1, Abdulraqeb Alhammadi2,*, Ibraheem Shayea3, Azizul Azizan4, Wan Haslina Hassan2

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4571-4587, 2022, DOI:10.32604/cmc.2022.024642

    Abstract Mobile broadband (MBB) networks are expanding rapidly to deliver higher data speeds. The fifth-generation cellular network promises enhanced-MBB with high-speed data rates, low power connectivity, and ultra-low latency video streaming. However, existing cellular networks are unable to perform well due to high latency and low bandwidth, which degrades the performance of various applications. As a result, monitoring and evaluation of the performance of these network-supported services is critical. Mobile network providers optimize and monitor their network performance to ensure the highest quality of service to their end-users. This paper proposes a Bayesian model to estimate the minimum opinion score (MOS)… More >

  • Open Access

    ARTICLE

    Discrete Firefly Algorithm for Optimizing Topology Generation and Core Mapping of Network-on-Chip

    S. Parvathi*, S. Umamaheswari

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 15-32, 2022, DOI:10.32604/iasc.2022.025290

    Abstract Network-on-chip (NoC) proves to be the best alternative to replace the traditional bus-based interconnection in Multi-Processor System on a Chip (MPSoCs). Irregular NoC topologies are highly recommended and utilised in various applications as they are application specific. Optimized mapping of the cores in a NoC plays a major role in its performance. Firefly algorithm is a bio-inspired meta-heuristic approach. Discretized firefly algorithm is used in our proposed work. In this work, two optimization algorithms are proposed: Topology Generation using Discrete Firefly Algorithm (TGDFA) and Core Mapping using Discrete Firefly Algorithm (CMDFA) for multimedia benchmark applications, Video Object Plane Decoder (VOPD),… More >

Displaying 41-50 on page 5 of 121. Per Page